In message <93Jun21.003959pdt.14001-3@well.sf.ca.us>, "George A. Gleason" writes:
interesting... If I understand you; it's keep your DES key in your head, and use the DES cyphertext to create an appropriate OTP key that decrypts back to something innocuous. good. The thing is, to make this credible, we still need an OTP program which is in general use for communications.
Yeah. OTP's seem awfully cumbersome.
Now here's another possible problem. Let's say that They are tapping you and grab all the cyphertext of your actual communications. Now they grab your hard drive and what they get is a different batch of cyphertext. That in and of itself might call up some suspicions. Any solution in sight...?
Hmm? I don't understand this problem. There's only one set of cyphertext.. the actual cyphertext. Do you mean "different batch of cyphertext" as the OTP which creates the innocuous plaintext from the cyphertext? Maybe encrypt the OTP w/DES and keep it on your hard drive. When "they" snag the drive, they see the different cyphertext, you tell them that it's the OTP you used and give them the DES-key to decrypt the innocuous OTP. I sense a problem with histogram equalization, however. Is there a problem here or does OTP-encryption take care of that? -- | Sameer Parekh-zane@genesis.MCS.COM-PFA related mail to pfa@genesis.MCS.COM | | Apprentice Philosopher, Writer, Physicist, Healer, Programmer, Lover, more | | "Symbiosis is Good" - Me_"Specialization is for Insects" - R. A. Heinlein_/ \_______________________/ \______________________________________________/
Hmm? I don't understand this problem. There's only one set of cyphertext.. the actual cyphertext. Do you mean "different batch of cyphertext" as the OTP which creates the innocuous plaintext from the cyphertext? Maybe encrypt the OTP w/DES and keep it on your hard drive. When "they" snag the drive, they see the different cyphertext, you tell them that it's the OTP you used and give them the DES-key to decrypt the innocuous OTP. I sense a problem with histogram equalization, however. Is there a problem here or does OTP-encryption take care of that?
With a OTP any plaintext can correspond with any cyphertext given: PAD (+) plaintext = cyphertext meaning PAD (+) cyphertext = plaintext and plaintext (+) cyphertext = PAD so, take your output of DES, xor its contents with desired "false plaintext" this is your false pad. store this on a seperate disk and make it look all secret-like. When feds come and take your cyphertext (which is output of DES) they ask for your key. You hand over your disk with (fake) PAD. They xor the two together to get (fake) plaintext which reads. You dont have to do this before hand either, if you have a copy of your cyphertext after the feds confiscate a copy from you you can generate pad to make it say something that will really freak them out, like something you couldnt have known prior to the seizure of the cyphertext : "I will be illegally raided on July 2, 1994, sounds sort of like '1984' to me. I wish the government would stay out of my life"
| Sameer Parekh-zane@genesis.MCS.COM-PFA related mail to pfa@genesis.MCS.COM |
peace.
participants (2)
-
Timothy Newsham
-
zaneļ¼ genesis.mcs.com